General

  • Target

    324c53b81b626af489bb2a1d0a42cc88b4e7f18e291060503455ac1a7a4fce90.exe

  • Size

    32KB

  • Sample

    240927-ssamwa1eqg

  • MD5

    c67eed120155cdf646a2510a6b003596

  • SHA1

    82225def4effc77a5f36875f66b7c9adf39bdaea

  • SHA256

    324c53b81b626af489bb2a1d0a42cc88b4e7f18e291060503455ac1a7a4fce90

  • SHA512

    c739d9583f2ea6a53f8bbb29db2190d57903ff62984b43a9894913ceab4badd661a8be0ecc321681a7bed748d65bf88ef1428123a3a99721929f12f56afa2c92

  • SSDEEP

    384:qr0ZyYkmNYUo4gsiRNG34OWpHNFPIsKTOyElDXodg9TdFpyFEIGsJjwE7UMcrieO:lPVlENGopftZouDbEEIGfRf+f

Malware Config

Extracted

Family

njrat

Botnet

Person_Anonymous

Mutex

b48bd383056441b474989fb5582a172b

Attributes
  • reg_key

    b48bd383056441b474989fb5582a172b

Targets

    • Target

      324c53b81b626af489bb2a1d0a42cc88b4e7f18e291060503455ac1a7a4fce90.exe

    • Size

      32KB

    • MD5

      c67eed120155cdf646a2510a6b003596

    • SHA1

      82225def4effc77a5f36875f66b7c9adf39bdaea

    • SHA256

      324c53b81b626af489bb2a1d0a42cc88b4e7f18e291060503455ac1a7a4fce90

    • SHA512

      c739d9583f2ea6a53f8bbb29db2190d57903ff62984b43a9894913ceab4badd661a8be0ecc321681a7bed748d65bf88ef1428123a3a99721929f12f56afa2c92

    • SSDEEP

      384:qr0ZyYkmNYUo4gsiRNG34OWpHNFPIsKTOyElDXodg9TdFpyFEIGsJjwE7UMcrieO:lPVlENGopftZouDbEEIGfRf+f

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks